Statements (89)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:sports_club
|
gptkbp:are_part_of |
the Allied cryptographic community
the Government Code and Cypher School the UK’s counterintelligence efforts the UK’s defense strategy the UK’s intelligence community the UK’s military operations the UK’s strategic planning efforts the UK’s wartime efforts the UK’s wartime strategy |
gptkbp:associated_with |
gptkb:Bletchley_Park
|
gptkbp:collaborated_with |
American codebreakers
|
gptkbp:contributed_to |
Allied victory in World War II
|
gptkbp:created |
codebreaking techniques
|
gptkbp:developed_by |
gptkb:the_Bombe_machine
gptkb:Colossus_computer |
gptkbp:faced |
ethical dilemmas
|
gptkbp:had |
a diverse team
a lasting legacy a secretive culture a role in the development of artificial intelligence a significant impact on the field of computer science |
gptkbp:has_access_to |
top secret information
|
gptkbp:has_impact_on |
modern computing
|
https://www.w3.org/2000/01/rdf-schema#label |
British codebreakers
|
gptkbp:included |
gptkb:Gordon_Welchman
gptkb:Joan_Clarke gptkb:Alan_Turing gptkb:Dilly_Knox |
gptkbp:influenced |
gptkb:intelligence_operations
|
gptkbp:inspired |
future generations of cryptographers
|
gptkbp:is_active_in |
gptkb:the_Cold_War
|
gptkbp:is_analyzed_in |
military communications
|
gptkbp:is_celebrated_in |
books and films
|
gptkbp:is_influential_in |
the field of information security
the evolution of cryptographic techniques the establishment of GCHQ |
gptkbp:is_recognized_by |
gptkb:Queen_Elizabeth_II
their teamwork their contributions to national security their innovative approaches their strategic importance their analytical skills their contributions to cryptography their contributions to global security. their contributions to military intelligence their innovative solutions their role in intelligence gathering their role in shaping intelligence policy |
gptkbp:is_trained_in |
mathematical logic
|
gptkbp:known_for |
breaking the Enigma code
|
gptkbp:operates_in |
during World War II
|
gptkbp:part_of |
gptkb:British_intelligence
|
gptkbp:received |
posthumous honors
|
gptkbp:uses |
gptkb:crypt
statistical methods punch cards |
gptkbp:utilized |
gptkb:Mathematics
|
gptkbp:was_a_pioneer_in |
gptkb:Information_Technology
|
gptkbp:was_involved_in |
the Battle of Britain
the development of secure messaging systems the development of algorithms the interception of communications the development of intelligence analysis techniques the establishment of intelligence networks the establishment of intelligence protocols the establishment of intelligence sharing agreements the analysis of diplomatic communications the analysis of enemy codes the analysis of foreign communications the analysis of intercepted messages the creation of the first programmable computer the deciphering of Japanese codes the development of codebreaking machines the development of decryption techniques the development of encryption methods the development of secure communications the establishment of cryptographic standards the establishment of modern cryptography the training of new codebreakers |
gptkbp:was_supported_by |
the British government
|
gptkbp:were_essential_to |
the success of D-Day
|
gptkbp:were_secretive_about |
their work
|
gptkbp:works_on |
gptkb:Lorenz_cipher
|
gptkbp:works_with |
female codebreakers
|
gptkbp:bfsParent |
gptkb:US_codebreakers
gptkb:The_Battle_of_Britain gptkb:Breaking_Enigma_Code |
gptkbp:bfsLayer |
4
|